{"id":"https://openalex.org/W4210985043","doi":"https://doi.org/10.1109/sin54109.2021.9699368","title":"Situational Control of a Computer Network Security System in Conditions of Cyber Attacks","display_name":"Situational Control of a Computer Network Security System in Conditions of Cyber Attacks","publication_year":2021,"publication_date":"2021-12-15","ids":{"openalex":"https://openalex.org/W4210985043","doi":"https://doi.org/10.1109/sin54109.2021.9699368"},"language":"en","primary_location":{"id":"doi:10.1109/sin54109.2021.9699368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin54109.2021.9699368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 14th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033986640","display_name":"Igor Kotenko","orcid":"https://orcid.org/0000-0001-6859-7120"},"institutions":[{"id":"https://openalex.org/I1313323035","display_name":"Russian Academy of Sciences","ror":"https://ror.org/05qrfxd25","country_code":"RU","type":"funder","lineage":["https://openalex.org/I1313323035"]},{"id":"https://openalex.org/I4210144352","display_name":"State Research Center of the Russian Federation","ror":"https://ror.org/04qpssw85","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210144352"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Igor Kotenko","raw_affiliation_strings":["St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS),Laboratory of Computer Security Problems,St. Petersburg,Russia","Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS),Laboratory of Computer Security Problems,St. Petersburg,Russia","institution_ids":["https://openalex.org/I1313323035"]},{"raw_affiliation_string":"Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210144352","https://openalex.org/I1313323035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091857773","display_name":"Igor Saenko","orcid":"https://orcid.org/0000-0002-9051-5272"},"institutions":[{"id":"https://openalex.org/I1313323035","display_name":"Russian Academy of Sciences","ror":"https://ror.org/05qrfxd25","country_code":"RU","type":"funder","lineage":["https://openalex.org/I1313323035"]},{"id":"https://openalex.org/I4210144352","display_name":"State Research Center of the Russian Federation","ror":"https://ror.org/04qpssw85","country_code":"RU","type":"facility","lineage":["https://openalex.org/I4210144352"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Igor Saenko","raw_affiliation_strings":["St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS),Laboratory of Computer Security Problems,St. Petersburg,Russia","Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia"],"affiliations":[{"raw_affiliation_string":"St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS),Laboratory of Computer Security Problems,St. Petersburg,Russia","institution_ids":["https://openalex.org/I1313323035"]},{"raw_affiliation_string":"Laboratory of Computer Security Problems, St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), St. Petersburg, Russia","institution_ids":["https://openalex.org/I4210144352","https://openalex.org/I1313323035"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081915068","display_name":"Oleg Lauta","orcid":"https://orcid.org/0000-0001-7826-9083"},"institutions":[{"id":"https://openalex.org/I4210118311","display_name":"Admiral Makarov State University of Maritime and Inland Shipping","ror":"https://ror.org/02xh9a707","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210118311"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Oleg Lauta","raw_affiliation_strings":["Admiral Makarov State University of Maritime and Inland Shipping,Department of Telecommunications and Computer Systems,St. Petersburg,Russia"],"affiliations":[{"raw_affiliation_string":"Admiral Makarov State University of Maritime and Inland Shipping,Department of Telecommunications and Computer Systems,St. Petersburg,Russia","institution_ids":["https://openalex.org/I4210118311"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010039499","display_name":"Mikhail Karpov","orcid":"https://orcid.org/0009-0004-8794-625X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mikhail Karpov","raw_affiliation_strings":["St. Petersburg Signal Academy,Department of Telecommunication Security,St. Petersburg,Russia"],"affiliations":[{"raw_affiliation_string":"St. Petersburg Signal Academy,Department of Telecommunication Security,St. Petersburg,Russia","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5033986640"],"corresponding_institution_ids":["https://openalex.org/I1313323035","https://openalex.org/I4210144352"],"apc_list":null,"apc_paid":null,"fwci":0.1373,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.49198321,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14470","display_name":"Advanced Data Processing Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.9847000241279602,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14420","display_name":"Advanced Research in Systems and Signal Processing","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7547372579574585},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6605661511421204},{"id":"https://openalex.org/keywords/state-space","display_name":"State space","score":0.6137853860855103},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6081579923629761},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.5994502902030945},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.5680872797966003},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5306645035743713},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49135270714759827},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4833640456199646},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.43304935097694397},{"id":"https://openalex.org/keywords/control-system","display_name":"Control system","score":0.41296565532684326},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1469913125038147},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.12550997734069824},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.09873861074447632}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7547372579574585},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6605661511421204},{"id":"https://openalex.org/C72434380","wikidata":"https://www.wikidata.org/wiki/Q230930","display_name":"State space","level":2,"score":0.6137853860855103},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6081579923629761},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.5994502902030945},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.5680872797966003},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5306645035743713},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49135270714759827},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4833640456199646},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.43304935097694397},{"id":"https://openalex.org/C17500928","wikidata":"https://www.wikidata.org/wiki/Q959968","display_name":"Control system","level":2,"score":0.41296565532684326},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1469913125038147},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12550997734069824},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.09873861074447632},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin54109.2021.9699368","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin54109.2021.9699368","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 14th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.5799999833106995}],"awards":[{"id":"https://openalex.org/G3767825875","display_name":null,"funder_award_id":"21-71-20078","funder_id":"https://openalex.org/F4320324099","funder_display_name":"Russian Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320324099","display_name":"Russian Science Foundation","ror":"https://ror.org/03y2gwe85"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W163745977","https://openalex.org/W416692946","https://openalex.org/W1591169890","https://openalex.org/W2001601386","https://openalex.org/W2015493286","https://openalex.org/W2165190673","https://openalex.org/W2510528222","https://openalex.org/W2605762779","https://openalex.org/W2610072730","https://openalex.org/W2612215144","https://openalex.org/W2902387927","https://openalex.org/W2957305577","https://openalex.org/W3158335281","https://openalex.org/W3159651651","https://openalex.org/W3199770607","https://openalex.org/W3200893443","https://openalex.org/W3201455797","https://openalex.org/W6737404088","https://openalex.org/W6754390070","https://openalex.org/W6794290777"],"related_works":["https://openalex.org/W3024912289","https://openalex.org/W2415747217","https://openalex.org/W2561023719","https://openalex.org/W4382644910","https://openalex.org/W2083687613","https://openalex.org/W2381954448","https://openalex.org/W2738227997","https://openalex.org/W4387444477","https://openalex.org/W2368512134","https://openalex.org/W4390321040"],"abstract_inverted_index":{"Modern":[0],"cyberattacks":[1,22,44],"are":[2,209],"the":[3,28,41,71,84,102,126,132,142,145,151,187,191,195,199,206,216],"most":[4,210],"powerful":[5],"disturbance":[6],"factor":[7],"for":[8,54,60,130,168],"computer":[9,31,62,173],"networks,":[10],"as":[11,156,158],"they":[12],"have":[13],"a":[14,52,61,88,93,115,172],"complex":[15],"and":[16,92,150,198],"devastating":[17],"impact.":[18],"The":[19,49,98,119,182],"impact":[20,217],"of":[21,30,43,73,86,95,100,128,144,147,154,171,179,194,218],"is":[23,45,77,81,112],"primarily":[24],"aimed":[25],"at":[26,108],"disrupting":[27],"performance":[29],"network":[32,63,174],"protection":[33],"means.":[34],"Therefore,":[35],"managing":[36,131],"this":[37],"defense":[38],"system":[39,59,65,89,104,134,176],"in":[40,67,70,105,177],"face":[42],"an":[46,56],"important":[47],"task.":[48],"paper":[50],"examines":[51],"technique":[53,120,197],"constructing":[55,87],"effective":[57],"control":[58,96,110,161,170],"security":[64,103,133,175],"operating":[66],"real":[68],"time":[69],"context":[72],"cyber":[74,138,180,219],"attacks.":[75,181,220],"It":[76],"supposed":[78],"that":[79,208],"it":[80,122,203],"built":[82],"on":[83,141],"basis":[85],"state":[90,107],"space":[91,146],"stack":[94],"decisions.":[97,162],"probability":[99],"finding":[101],"certain":[106],"each":[109],"step":[111],"calculated":[113],"using":[114,186],"finite":[116],"Markov":[117],"chain.":[118],"makes":[121],"possible":[123],"to":[124,137,201,204,212],"predict":[125],"number":[127,153],"iterations":[129],"when":[135],"exposed":[136],"attacks,":[139],"depending":[140],"segment":[143],"its":[148],"states":[149],"selected":[152],"transitions,":[155],"well":[157],"automatically":[159],"generate":[160],"An":[163],"algorithm":[164],"has":[165],"been":[166],"developed":[167,196],"situational":[169],"conditions":[178],"experimental":[183],"results":[184],"obtained":[185],"generated":[188],"dataset":[189],"demonstrated":[190],"high":[192],"efficiency":[193],"ability":[200],"use":[202],"determine":[205],"parameters":[207],"susceptible":[211],"abnormal":[213],"deviations":[214],"during":[215]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
